Category: TheHackerNews

ChromeLoader Malware
27
Feb
2023

ChromeLoader Malware Targeting Gamers via Fake Nintendo and Steam Game Hacks

Feb 27, 2023Ravie LakshmananBrowser Security / Malware A new ChromeLoader malware campaign has been observed being distributed via virtual hard…

Data Theft and Extortion Scheme
27
Feb
2023

Dutch Police Arrest 3 Hackers Involved in Massive Data Theft and Extortion Scheme

Feb 27, 2023Ravie Lakshmanan The Dutch police announced the arrest of three individuals in connection with a “large-scale” criminal operation…

CISA
24
Feb
2023

CISA Sounds Alarm on Cybersecurity Threats Amid Russia’s Invasion Anniversary

Feb 24, 2023Ravie LakshmananCyber War / Cybersecurity The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is urging organizations and individuals…

Cybersecurity
24
Feb
2023

How to Use AI in Cybersecurity and Avoid Being Trapped

Feb 24, 2023The Hacker NewsArtificial Intelligence / Cybersecurity The use of AI in cybersecurity is growing rapidly and is having…

Security of SoC Processors
24
Feb
2023

Google Teams Up with Ecosystem Partners to Enhance Security of SoC Processors

Feb 24, 2023Ravie LakshmananMobile Security / Firmware Google said it’s working with ecosystem partners to harden the security of firmware…

SaaS Challenges of 2023
24
Feb
2023

How to Tackle the Top SaaS Challenges of 2023

Feb 24, 2023The Hacker NewsCybersecurity Webinar / SaaS Security Are you prepared to tackle the top SaaS challenges of 2023?…

Data Safety Labels
24
Feb
2023

Even Top-Ranked Android Apps in Google Play Store Provide Misleading Data Safety Labels

Feb 24, 2023Ravie LakshmananPrivacy / Data Safety An investigation into data safety labels for Android apps available on the Google…

Mining Cryptocurrency
23
Feb
2023

New S1deload Malware Hijacking Users’ Social Media Accounts and Mining Cryptocurrency

Feb 23, 2023Ravie LakshmananCryptocurrency / Malware An active malware campaign has set its sights on Facebook and YouTube users by…

Cryptocurrency Mining Malware
23
Feb
2023

Hackers Using Trojanized macOS Apps to Deploy Evasive Cryptocurrency Mining Malware

Feb 23, 2023Ravie LakshmananEndpoint Security / Cryptocurrency Trojanized versions of legitimate applications are being used to deploy evasive cryptocurrency mining…

Experts Sound Alarm Over Growing Attacks Exploiting Zoho ManageEngine Products
23
Feb
2023

Experts Sound Alarm Over Growing Attacks Exploiting Zoho ManageEngine Products

Feb 23, 2023Ravie Lakshmanan Multiple threat actors have been observed opportunistically weaponizing a now-patched critical security vulnerability impacting several Zoho…

Lazarus Group
23
Feb
2023

Lazarus Group Likely Using New WinorDLL64 Backdoor to Exfiltrate Sensitive Data

Feb 23, 2023Ravie LakshmananCyber Threat / Data Security A new backdoor associated with a malware downloader named Wslink has been…

Vulnerability
23
Feb
2023

The Secret Vulnerability Finance Execs are Missing

The (Other) Risk in Finance A few years ago, a Washington-based real estate developer received a document link from First…